Implementation of Network and Server Monitoring on Mikrotik with Netwatch Via Telegram Bot

Yohanes Maestro Pasaribu, Ferdiansyah Ferdiansyah

Abstract


Computer network is a communication between two or more computers that can exchange information data. The development of a network is supported by adequate devices in that place. When the network has developed, it must be able to periodically monitor all connected network devices. Methodist School 2 conducts online platform-based learning, namely JIA (Jelajah Ilmu Acer) for the junior high, high school and vocational levels. Mehtodist 2 Palembang School uses Mikrotik as its network router, a problem was found that it could not control the network at Methodist School 2 Palembang regularly. This will make it difficult for a network administrator to supervise because they have to control and analyze the performance of their devices and network communications manually. With this problem, the author made an Implementation of Network and Server Monitoring on Mikrotik with Netwatch via Telegram Bot, the author configured several logs that will be integrated into the telegram bot in the Mikrotik tool, Netwatch. The telegram bot will send message notifications about the status of connected devices in the proxy, with this project it is hoped that the author can help network administrators to be able to help control and analyze the network at Methodist School 2 Palembang.


Full Text:

PDF

References


A. Ferrando, “Combine Model Checking and Runtime Verification in Multi-Agent Systems (short paper)?,” CEUR Workshop Proceedings, vol. 3072. pp. 302–310, 2021. [Online]. Available: https://api.elsevier.com/content/abstract/scopus_id/85123275549

X. Xie, “Automated Rule Checking for MEP Systems Based on BIM and KBMS,” Buildings, vol. 12, no. 7, 2022, doi: 10.3390/buildings12070934.

S. Lazreg, “Verification of Variability-Intensive Stochastic Systems with Statistical Model Checking,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13703. pp. 448–471, 2022. doi: 10.1007/978-3-031-19759-8_27.

P. Ovsiannikova, “Towards user-friendly model checking of IEC 61499 systems with counterexample explanation,” IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2021. 2021. doi: 10.1109/ETFA45728.2021.9613491.

V. V Shkarupylo, “On Applicability of Model Checking Technique in Power Systems and Electric Power Industry,” Studies in Systems, Decision and Control, vol. 399. pp. 3–21, 2022. doi: 10.1007/978-3-030-87675-3_1.

D. V Efanov, “The Weight-Based Sum Codes in the Residue Ring by Arbitrary Modulus for Synthesis of Self-Checking Digital Computing Systems,” 2021 IEEE East-West Design and Test Symposium, EWDTS 2021 - Proceedings. 2021. doi: 10.1109/EWDTS52692.2021.9581032.

P. Nov, “Developing an automated system for checking the strut arrangement in deep excavation,” Eng. J., vol. 25, no. 1, pp. 99–124, 2021, doi: 10.4186/ej.2021.25.1.99.

M. M. Hossain, “Developing an automated safety checking system using BIM: a case study in the Bangladeshi construction industry,” Int. J. Constr. Manag., vol. 22, no. 7, pp. 1206–1224, 2022, doi: 10.1080/15623599.2019.1686833.

Q. Chen, “Compliance Checking Based Detection of Insider Threat in Industrial Control System of Power Utilities,” Proceedings - 2022 7th Asia Conference on Power and Electrical Engineering, ACPEE 2022. pp. 1142–1147, 2022. doi: 10.1109/ACPEE53904.2022.9784085.

N. Jnoub, “Fact-checking reasoning system for fake review detection using answer set programming,” Algorithms, vol. 14, no. 7, 2021, doi: 10.3390/a14070190.

A. Valmari, “Automated Checking of Flexible Mathematical Reasoning in the Case of Systems of (In)Equations and the Absolute Value Operator,” International Conference on Computer Supported Education, CSEDU - Proceedings, vol. 2. pp. 324–331, 2021. [Online]. Available: https://api.elsevier.com/content/abstract/scopus_id/85121660387

P. Burggräf, “Creation of an expert system for design validation in BIM-based factory design through automatic checking of semantic information,” Procedia CIRP, vol. 99. pp. 3–8, 2021. doi: 10.1016/j.procir.2021.03.012.

M. M. de Lucena, “An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems,” Des. Autom. Embed. Syst., vol. 25, no. 2, pp. 89–111, 2021, doi: 10.1007/s10617-020-09240-8.

J. Lee, “Unlocking Conspiracy Belief Systems: How Fact-Checking Label on Twitter Counters Conspiratorial MMR Vaccine Misinformation,” Health Commun., 2022, doi: 10.1080/10410236.2022.2031452.

L. He, “Petri-Net-Based Model Checking for Privacy-Critical Multiagent Systems,” IEEE Trans. Comput. Soc. Syst., 2022, doi: 10.1109/TCSS.2022.3164052.

L. Cheng, “Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems,” IEEE Trans. Dependable Secur. Comput., vol. 18, no. 2, pp. 825–842, 2021, doi: 10.1109/TDSC.2019.2906161.

P. Ballarini, “Formal analysis of production line systems by probabilistic model checking tools,” IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2021. 2021. doi: 10.1109/ETFA45728.2021.9613494.

B. Kim, “How Robust are Fact Checking Systems on Colloquial Claims?,” NAACL-HLT 2021 - 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference. pp. 1535–1548, 2021. [Online]. Available: https://api.elsevier.com/content/abstract/scopus_id/85118031376

F. Mercaldo, “MODEL CHECKING FOR REAL-TIME ATTACK DETECTION IN WATER DISTRIBUTION SYSTEMS,” Informatics Autom., vol. 21, no. 2, pp. 219–242, 2022, doi: 10.15622/IA.21.2.1.

Y. Wang, “Exciton-plasmon interactions gated self-checking functional photoelectrochemical system for adenosine monitoring,” Sensors Actuators, B Chem., vol. 336, 2021, doi: 10.1016/j.snb.2021.129746.

D. Liu, “Flexible Data Integrity Checking with Original Data Recovery in IoT-Enabled Maritime Transportation Systems,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2618–2629, 2023, doi: 10.1109/TITS.2021.3125070.

A. A. Hamza, “HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps,” Sensors, vol. 22, no. 3, 2022, doi: 10.3390/s22031079.

N. Drawel, “Transformation-based model checking temporal trust in multi-agent systems,” J. Syst. Softw., vol. 192, 2022, doi: 10.1016/j.jss.2022.111383.

S. Ahmed, “Fact Checking: An Automatic End to End Fact Checking System,” Studies in Computational Intelligence, vol. 1001. pp. 345–366, 2022. doi: 10.1007/978-3-030-90087-8_17.




DOI: http://dx.doi.org/10.24014/sitekin.v21i2.25460

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 SITEKIN: Jurnal Sains, Teknologi dan Industri




Editorial Address:
FAKULTAS SAINS DAN TEKNOLOGI
UIN SULTAN SYARIF KASIM RIAU

Kampus Raja Ali Haji
Gedung Fakultas Sains & Teknologi UIN Suska Riau
Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293
Email: sitekin@uin-suska.ac.id
© 2023 SITEKIN, ISSN 2407-0939

SITEKIN Journal Indexing:

Google Scholar | Garuda | Moraref | IndexCopernicus | SINTA


Creative Commons License
SITEKIN by http://ejournal.uin-suska.ac.id/index.php